[go: up one dir, main page]

WO2018138729A8 - Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet - Google Patents

Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet Download PDF

Info

Publication number
WO2018138729A8
WO2018138729A8 PCT/IL2018/050098 IL2018050098W WO2018138729A8 WO 2018138729 A8 WO2018138729 A8 WO 2018138729A8 IL 2018050098 W IL2018050098 W IL 2018050098W WO 2018138729 A8 WO2018138729 A8 WO 2018138729A8
Authority
WO
WIPO (PCT)
Prior art keywords
establishing
computing devices
secure connection
information packet
electronic computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IL2018/050098
Other languages
French (fr)
Other versions
WO2018138729A1 (en
Inventor
Zeev Glozman
Markus Neff
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beame Io Ltd
Original Assignee
Beame Io Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beame Io Ltd filed Critical Beame Io Ltd
Priority to US16/303,214 priority Critical patent/US10686779B2/en
Priority to EP18703372.5A priority patent/EP3430766B1/en
Publication of WO2018138729A1 publication Critical patent/WO2018138729A1/en
Publication of WO2018138729A8 publication Critical patent/WO2018138729A8/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3215Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/256NAT traversal
    • H04L61/2589NAT traversal over a relay server, e.g. traversal using relay for network address translation [TURN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2592Translation of Internet protocol [IP] addresses using tunnelling or encapsulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/88Medical equipments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/081Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying self-generating credentials, e.g. instead of receiving credentials from an authority or from another peer, the credentials are generated at the entity itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2514Translation of Internet protocol [IP] addresses between local and global IP addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Disclosed is a computer-implemented method for establishing a secure connection between two electronic computing devices which are located in a network environment, the two electronic computing devices being a first computing device offering the connection and a second computing device designated to accept the connection, the method comprising executing, by at least one processor of at least one computer, a connection-establishing application for exchanging an information packet between the first computing device and the second computing device comprising a secret usable for establishing the connection, and evaluating a response from the second computing device for establishing the secure connection.
PCT/IL2018/050098 2017-01-29 2018-01-29 Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet Ceased WO2018138729A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US16/303,214 US10686779B2 (en) 2017-01-29 2018-01-29 Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet
EP18703372.5A EP3430766B1 (en) 2017-01-29 2018-01-29 Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
PCT/IL2017/050103 WO2018138713A1 (en) 2017-01-29 2017-01-29 Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet
ILPCT/IL2017/050103 2017-01-29

Publications (2)

Publication Number Publication Date
WO2018138729A1 WO2018138729A1 (en) 2018-08-02
WO2018138729A8 true WO2018138729A8 (en) 2018-09-20

Family

ID=58231675

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/IL2017/050103 Ceased WO2018138713A1 (en) 2017-01-29 2017-01-29 Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet
PCT/IL2018/050098 Ceased WO2018138729A1 (en) 2017-01-29 2018-01-29 Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/IL2017/050103 Ceased WO2018138713A1 (en) 2017-01-29 2017-01-29 Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet

Country Status (3)

Country Link
US (3) US11218465B2 (en)
EP (1) EP3430766B1 (en)
WO (2) WO2018138713A1 (en)

Families Citing this family (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8903973B1 (en) 2008-11-10 2014-12-02 Tanium Inc. Parallel distributed network management
US11172470B1 (en) 2012-12-21 2021-11-09 Tanium Inc. System, security and network management using self-organizing communication orbits in distributed networks
WO2015147779A1 (en) * 2014-03-24 2015-10-01 Hewlett-Packard Development Company, L.P. Monitoring for authentication information
US10873645B2 (en) 2014-03-24 2020-12-22 Tanium Inc. Software application updating in a local network
US11461208B1 (en) 2015-04-24 2022-10-04 Tanium Inc. Reliable map-reduce communications in a decentralized, self-organizing communication orbit of a distributed network
US11886229B1 (en) 2016-03-08 2024-01-30 Tanium Inc. System and method for generating a global dictionary and performing similarity search queries in a network
US11609835B1 (en) 2016-03-08 2023-03-21 Tanium Inc. Evaluating machine and process performance in distributed system
US11153383B2 (en) 2016-03-08 2021-10-19 Tanium Inc. Distributed data analysis for streaming data sources
US10929345B2 (en) 2016-03-08 2021-02-23 Tanium Inc. System and method of performing similarity search queries in a network
US11372938B1 (en) 2016-03-08 2022-06-28 Tanium Inc. System and method for performing search requests in a network
WO2018138713A1 (en) 2017-01-29 2018-08-02 Beame. Io Ltd. Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet
CN110809879B (en) * 2017-06-28 2021-04-27 株式会社OPTiM A kind of Web conference sound assistant system, method and program
US10824729B2 (en) 2017-07-14 2020-11-03 Tanium Inc. Compliance management in a local network
US10834170B2 (en) * 2018-03-19 2020-11-10 Citrix Systems, Inc. Cloud authenticated offline file sharing
FR3083887B1 (en) * 2018-07-11 2020-11-27 Wallix METHOD AND DEVICE FOR DETECTION OF COMPROMISE OF A TARGET BY A LATERAL ATTACK
US11343355B1 (en) * 2018-07-18 2022-05-24 Tanium Inc. Automated mapping of multi-tier applications in a distributed system
US10841365B2 (en) * 2018-07-18 2020-11-17 Tanium Inc. Mapping application dependencies in a computer network
US11288347B2 (en) * 2019-03-07 2022-03-29 Paypal, Inc. Login from an alternate electronic device
EP3942735B1 (en) * 2019-03-20 2025-10-08 Dfinity Stiftung Distributed network with blinded identities
WO2020197547A1 (en) * 2019-03-27 2020-10-01 Xinova, LLC Detection of deep fake videos based on digital signature
US11483143B2 (en) * 2019-04-15 2022-10-25 Smart Security Systems, Llc Enhanced monitoring and protection of enterprise data
EP3734902A1 (en) * 2019-04-29 2020-11-04 Siemens Aktiengesellschaft Method and system for allocating publicly trusted certificates, engineering or management system and technical equipment
EP4035035A4 (en) * 2019-09-25 2023-10-04 Commonwealth Scientific and Industrial Research Organisation CRYPTOGRAPHIC SERVICES FOR BROWSER APPLICATIONS
US11831670B1 (en) 2019-11-18 2023-11-28 Tanium Inc. System and method for prioritizing distributed system risk remediations
US11589226B2 (en) * 2019-12-17 2023-02-21 Cisco Technology, Inc. Multi-factor authentication for mobile security protocol
US11489686B2 (en) 2020-01-14 2022-11-01 Citrix Systems, Inc. Virtual meetings in ad-hoc networks
CN113225188B (en) * 2020-01-19 2023-09-22 华为技术有限公司 Login authentication method, device and system
US11012233B1 (en) * 2020-01-22 2021-05-18 Coinplug, Inc. Method for providing authentication service by using decentralized identity and server using the same
US11310059B2 (en) * 2020-06-02 2022-04-19 Microsoft Technology Licensing, Llc Ephemeral cryptography keys for authenticating computing services
CN111787131B (en) * 2020-06-24 2023-02-21 百度在线网络技术(北京)有限公司 ID generation method and electronic device
US11563764B1 (en) 2020-08-24 2023-01-24 Tanium Inc. Risk scoring based on compliance verification test results in a local network
EP4226571A4 (en) * 2020-10-09 2023-11-01 Visa International Service Association TOKEN SECURITY SYSTEM AND METHOD
CN112492004B (en) * 2020-11-17 2023-02-17 深圳市晨北科技有限公司 Method, device, system and storage medium for establishing local communication link
DE202021100647U1 (en) * 2021-02-10 2021-02-17 Biotronik Se & Co. Kg Personal data anonymization system (PDAS) with customer-specific token
US12278913B2 (en) 2021-05-11 2025-04-15 Metalinxx, Inc. Apparatus and methods for management of controlled objects
US11477027B1 (en) 2021-05-11 2022-10-18 Dennis Palatov Apparatus and methods for management of controlled objects
CN115604221A (en) * 2021-06-25 2023-01-13 中兴通讯股份有限公司(Cn) Information processing method, intermediate resolver, network device and storage medium
US12231467B1 (en) 2021-10-19 2025-02-18 Tanium Inc. System and method for deputizing satellite endpoints
US12423453B2 (en) * 2021-12-24 2025-09-23 Intel Corporation Methods and apparatus to control access to user data based on user-specified attributes
US12225111B2 (en) * 2022-03-08 2025-02-11 SanDisk Technologies, Inc. Authorization requests from a data storage device to multiple manager devices
US12265167B2 (en) 2022-06-27 2025-04-01 Samsung Electronics Co., Ltd. Wireless receive signal strength indicator (RSSI)-based positioning
EP4293676A1 (en) * 2022-11-02 2023-12-20 Siemens Healthcare GmbH Medical imaging device and method for providing a user interface for a medical accessory device
US20240154808A1 (en) * 2022-11-03 2024-05-09 Change Healthcare Holdings, Llc Systems and methods of trace id validation and trust
US11943195B1 (en) * 2023-01-20 2024-03-26 Microsoft Technology Licensing, Llc Zero-trust DNS and FQDN based traffic acquisition using synthetic IP
US12452046B2 (en) * 2023-04-21 2025-10-21 Jpmorgan Chase Bank, N.A. Systems and methods for secure cryptographic secret distribution
US20240364665A1 (en) * 2023-04-27 2024-10-31 International Business Machines Corporation Securing access to a virtual machine via a service processor using a key
GB202308438D0 (en) * 2023-06-06 2023-07-19 Mastercard International Inc Secure payment communications network
US12368756B2 (en) * 2023-07-19 2025-07-22 Capital One Services, Llc Secondary data encryption via browser extension
US12093368B1 (en) * 2023-08-31 2024-09-17 Transparent Technologies, Inc. Zero trust system and method for securing data

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7181017B1 (en) * 2001-03-23 2007-02-20 David Felsher System and method for secure three-party communications
US7769997B2 (en) * 2002-02-25 2010-08-03 Network Resonance, Inc. System, method and computer program product for guaranteeing electronic transactions
WO2008096825A1 (en) * 2007-02-07 2008-08-14 Nippon Telegraph And Telephone Corporation Certificate authenticating method, certificate issuing device, and authentication device
US9078128B2 (en) * 2011-06-03 2015-07-07 Apple Inc. System and method for secure identity service
US8843740B2 (en) * 2011-12-02 2014-09-23 Blackberry Limited Derived certificate based on changing identity
US20140298415A1 (en) * 2013-03-28 2014-10-02 Research In Motion Limited Method and system for providing connectivity for an ssl/tls server behind a restrictive firewall or nat
SG10201806366TA (en) * 2015-03-25 2018-08-30 Sixscape Communications Pte Ltd Apparatus and method for managing digital certificates
US10826905B2 (en) * 2016-12-05 2020-11-03 Citrix Systems, Inc. Secure access to on-premises web services from multi-tenant cloud services
WO2018138713A1 (en) 2017-01-29 2018-08-02 Beame. Io Ltd. Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet

Also Published As

Publication number Publication date
WO2018138729A1 (en) 2018-08-02
US11711355B2 (en) 2023-07-25
EP3430766B1 (en) 2019-07-24
US20200053072A1 (en) 2020-02-13
US11218465B2 (en) 2022-01-04
WO2018138713A1 (en) 2018-08-02
US20200067914A1 (en) 2020-02-27
US10686779B2 (en) 2020-06-16
US20220191190A1 (en) 2022-06-16
EP3430766A1 (en) 2019-01-23

Similar Documents

Publication Publication Date Title
WO2018138729A8 (en) Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet
MY191655A (en) Method for controlling transmission of data
MY190550A (en) Method and device for processing service request
WO2014195501A3 (en) Electronic authentication systems
EP3806514A8 (en) Screen-analysis based device security
MX2016004033A (en) Bank transfer processing method and device.
GB2533727A (en) Registry apparatus, agent device, application providing apparatus and corresponding methods
CL2007001510A1 (en) Methods and client computing devices that allow delegating user credentials from the client computing device to a server computing device in a computer network, eventually in a single connection, and obtaining secure resources from the server.
GB2523284A (en) Communication channel failover in a high performance computing (HPC) network
EP4513367A3 (en) Semi-active probing framework to gather threat intelligence for encrypted traffic and learn about devices
GB2541572A (en) Applications of secured memory areas and secure environments in policy-based access control systems for mobile devices
PH12018501668A1 (en) Electronic payment service processing method and device, and electronic payment method and device
GB201121449D0 (en) Phishing processing method and system and computer readable storage medium applying the method
WO2014182787A3 (en) Systems and methods for high fidelity multi-modal out-of-band biometric authentication
ATE540519T1 (en) METHOD AND APPARATUS FOR SHARING COMMON-INTEREST CONNECTIONS BETWEEN COMMUNICATION DEVICES
WO2019007336A3 (en) Data processing method, apparatus and device
GB2508529A (en) Bios network access
WO2018057604A8 (en) System and methods for point to point encryption and tokenization using a mobile device
EP4246892A3 (en) Method and system for controlling the exchange of privacy-sensitive information
GB2509647A (en) Testing transaction applications
NZ702250A (en) Network based management of protected data sets
MX2017008163A (en) Techniques for contextual mobile data access.
EP3633574A4 (en) Data structure, transmission device, receiving device, settlement device, method, and computer program
HK1215747A1 (en) Transparently routing job submissions between disparate environments
TW201711736A (en) Information distribution methods, computer readable media, and information distribution servers

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 2018703372

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2018703372

Country of ref document: EP

Effective date: 20181016

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18703372

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE